With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
This research began by explaining its variables and dimensions especially the digital gap, which the authors explained it elaborately beginning with the concept, the reasons blind its emergence of its measurement, and how to treat it. The authors supposed the potentiality of relying on enforcing knowledge in general and the groups suffer from this gap in particular, especially the targeted knowledge to treat its subject.
As enforcing knowledge usually depends on some strategies or choices of organizational orientation among them is learning and training from one side, and communication, as an indicating factor for organizational effectiveness as the authors refer from the other side.
Kamel, S.H., R.F. Al-Jassani and H.A. Al-Shammari. 2022. Effects of Pseudomonas fluorescens, Bacillus thuringiensis tenebrionis Isolates and Biologically Synthesized Silver Nanoparticles on Cellulase Enzyme Activity in Workers' Digestive System of the Termite Microcerotermes diversus Silv. Arab Journal of Plant Protection, 40(4): 315-324. https://doi.org/10.22268/AJPP-40.4.315324 The purpose of this study was to investigate the effect of different bacterial isolates of P. fluorescens and B. t. tenebrionis and silver nanoparticles on the activity of the cellulase enzyme in termites' middle digestive system and its role in glucose release by treating cellulose media with bacterial strains and nanoparticles. Ultraviolet spectroscopy re
... Show MoreThe study was conducted at the fields of the Dept. of Horticulture and Garden Engineering, College of the Agricultural Engineering Sciences, Jadriyah in the fall season of 2020-2021 aiming to culture the coral lettuce with green and red leaves under the hydroponics system using the modified nutrient solution film NFT and study the effect of aqueous extracts of alfalfa and berseem sprouted seeds on the quantitative and qualitative yield of the lettuce crop. The research was conducted as an experiment of split plots within the Randomized Complete Block Design (RCBD) of three replicates. The seedlings of the green coral lettuce, Locarno RZ, and red coral lettuce, Locarno RZ, symbolized by A and B respectively, were transferred to the c
... Show MoreThis study was carried out at University of Baghdad - College of Agricultural Engineering Sciences - Research Station B during the autumn season 2019-2020, in order to evaluate the effect of Ozone and the foliar application of coconut water and moringa extract on the growth of broccoli plant grown in modified NFT film technology. A factorial experiment (2*5) was carried out within Nested Design with three replicates. The ozone treatment was distributed into the main plots which consisted of oxygen (O2) and ozone (O3). The foliar application of organic nutrients were distributed randomly within each replicate including five treatments, which were the control treatment (T0), Coconut water with two concentrations of 50 (T1) and 100 ml.
... Show MoreMany letters and theses written on the subject of consensus, as well as in measurement,
But we tried to address a topic of consensus
Building a blind measuring guide.
We have tried to explain the meaning of convening, then the statement of consensus in language and terminology and then the statement of measurement
Also, we have shown the types of consensus mentioned by the jurists, and this is how much was in the first topic, either
The second section included the statement of the doctrines of the blind in the matter, and then the evidence of each doctrine and discussed.
We followed it with the most correct opinion statement and concluded the research with some of the conclusions we reached through
search.
The research topics important topic of jurisprudence worship, a ruling Zakat ornaments
prepared for use, and touched the odds scholars in it. Stroll scholars say that there is no Zakat
on ornaments prepared for use have reported their evidence they and the owners say the other
of those who say should be directed to pay zakaat, and discuss those views and statement
Dafeeha of Sahihaa, and came up with a summary then, showed where the prevailing view
that I see in agreement of the transferee and reasonable. Ask Him to show us the right, and
thank God.
The aims of the lecture should be clearly defmed. These will help to define the teaching methods and the structure. If, for example, the purpose of the lecture is to introduce new knowledge and concepts, then a classic lecture structure might be most appropriate. On the other hand, if the purpose is to make the students aware of different approaches to a particular clinical problem, a problem oriented design in which alternative approaches are presented and discussed might be a more appropriate fonnat.
Lectures are still a common teaching methOd in both undergraduate and postgraduak medical education. Properly done, the lectwe is a creative and personal work by the teachll:l modeled upon his intellectual scaffolding. Few other fonns o
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreBN Rashid